Shared Flashcard Set

Details

IMS-3011
Chapters 4-6
78
Business
Undergraduate 3
03/19/2013

Additional Business Flashcards

 


 

Cards

Term
Copyright
Definition
the legal protection afforded an expression of an idea (ex: song, book or video game)
Term
Intellectual Property
Definition
is intangible creative work that is embodied in physical form and includes copyrights, trademarks & patents
Term
Privacy
Definition
the right to be left alone when you want to be, to have control over your personal possessions & not to be observed without your consent
Term
Confidentiality
Definition
the assurance that messages and information remain available only to those authorized to view them
Term
Information Ethics
Definition
govern the ethical & moral issues arising from the development & use of information technologies, as well as the creation, collection, duplication, distribution & processing of information itself
Term
Pirated Software
Definition
is the unauthorized use, duplication, distribution, or sale of copyrighted software
Term
Counterfeit Software
Definition
is software that is manufactured to look like the real thing & sold as such
Term
Information Management
Definition
examines the organizational resource of information and regulates is definitions, uses, value, & distribution ensuring it has the types of data/information required to function & grow effectively
Term
Information Governance
Definition
a method or system of government for information management or control
Term
Information Compliance
Definition
the act of conforming, acquiescing, or yielding information
Term
E-discovery
Definition
the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
Term
E-policy
Definition
are policies and procedures that address information management along with the ethical use of computers & the internet in the business environment
Term
Ethical Computer Use Policy
Definition
contains general principles to guide computer user behavior
Term
Acceptable Use Policy (AUP)
Definition
requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet
Term
Nonrepudiation
Definition
a contractual stipulation to ensure that ebusiness participants do not deny their online actions
Term
Internet Use Policy
Definition
contains general principles to guide the proper use of the internet
Term
Email Privacy Policy
Definition
details the extent to which email messages may be read by others
Term
Mail Bomb
Definition
a massive amount of emails sent to a specific person or system that can cause that users server to stop functioning
Term
Spam
Definition
is unsolicited email
Term
Anti-Spam Policy
Definition
states that email users will not send unsolicited emails
Term
Information Technology Monitoring
Definition
tracks peoples activities by such measures as number of keystrokes, error rate, and number transactions processed
Term
Employee Monitoring Policy
Definition
stating explicitly how, when, and where the company monitors its employees
Term
Downtime
Definition
a period of time when a system in unavailable
Term
Information Security
Definition
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Term
Hackers
Definition
experts in technology who use their knowledge to break into computers & computer networks, either for profit or just motivated by the challenge
Term
Virus
Definition
software written with malicious intent to cause annoyance or damage
Term
Adware
Definition
software that while purporting to serve some useful function and often fulfilling that function,also allows internet advertisers to display advertisements without the consent of the computer user
Term
Spyware
Definition
a special class of adware that collects data about the user & transmits it over the internet without the users knowledge or permission
Term
Insiders
Definition
legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident
Term
Social Engineering
Definition
hackers use their social skills to trick people into revealing access credentials or other valuable information
Term
Information Security Policies
Definition
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
Term
Identity Theft
Definition
the forging of someones identity for the purpose of fraud
Term
Phishing
Definition
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails designed to look real
Term
Pharming
Definition
reroutes request for legitimate websites to false websites
Term
Authentication
Definition
a method for confirming users identities
Term
Authorization
Definition
the process of providing a user with permission including access levels & abilities such as file access, hours of access, & amount of allocated storage space
Term
Tokens
Definition
small electronic devices that change users passwords automatically
Term
Content Filtering
Definition
occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
Term
Encryption
Definition
scrambles information into an alternative form that requires a key or password to decrypt
Term
Public Key Encryption (PKE)
Definition
uses two keys: a public key that everyone can have and private key for only the recipient
Term
Certificate Authority
Definition
is a trusted third party that validates user identities by means of digital certificates
Term
Digital Certificate
Definition
is a data file that identifies or organizations online and is comparable to digital signature
Term
Firewall
Definition
hardware and/or software that guard a private network by analyzing incoming & outgoing information for the correct markings
Term
Antivirus Software
Definition
scans and searches hard drives to prevent, detect, and remove known viruses, adware and spyware
Term
Intrusion Detection Software (IDS)
Definition
full-time monitoring tools that search for patterns in network traffic to identify intruders
Term
MIS Infrastructure
Definition
includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets
Term
Network
Definition
a communications system created by linking two or more devices & establishing a standard methodology in which they can communicate
Term
Client
Definition
a computer designed to request information from a server
Term
Server
Definition
a computer dedicated to providing information in response to request
Term
Enterprise Architect
Definition
a person grounded in technology, fluent in business & able to provide the important bridge between MIS & the business
Term
Fault Tolerance
Definition
the ability for a system to respond to unexpected failures or system crashes as the backup system immediately & automatically takes over with no loss of service
Term
Fail-over
Definition
a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, & if the primary server crashes, the users are automatically directed to the secondary server or backup server
Term
Fail-back
Definition
occurs when the primary machine recovers & resumes operations, taking over form the secondary server
Term
R.A.T.
Definition
Remote Administration Tool
Term
Data Warehouse
Definition
a logical collection of information, gathered from many different operational databases, that supports business analysis activities & decision-making tasks
Term
Data Mart
Definition
contains a subset of data warehouse information
Term
Database
Definition
maintains information about various types of objects(inventory),events(transactions),people(employees), and places(warehouses)
Term
Extraction-Transformation-Loading (ETL)
Definition
a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions & loads it into a data warehouse
Term
Entity Relationship Diagram (ERD)
Definition
a way to diagram the relationships between tables in a database & describes the attributes/columns & keys in each table
Term
Market Basket Analysis
Definition
analyzes such items as websites & checkout scanner information to detect customers buying behavior & predict future behavior by identifying affinities among customers choices of products & services
Term
Time-Series Forecasts
Definition
predictions based on time-series information
Term
Cluster Analysis
Definition
a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another & the different groups are as far apart as possible
Term
Information Granularity
Definition
refers to the extent of detail within the information(fine, detailed or coarse & abstract)
Term
Transactional Information
Definition
its primary purpose is to support daily operational tasks
Term
Analytical Information
Definition
its primary purpose is to support the performing of managerial analysis tasks
Term
Data Inconsistency
Definition
occurs when the same data element has different values
Term
Data Integrity Issues
Definition
occurs when a system produces incorrect, inconsistent, or duplicate data
Term
Data Base Management System (DBMS)
Definition
creates, reads, updates, and deletes data in a database while controlling access & security
Term
Metadata
Definition
provides details about data
Term
Entity
Definition
stores information about a person, place, thing, transaction, or event
Term
Sustainable MIS Disposal
Definition
refers to the safe disposal of MIS assets at the end of their life cycle
Term
E-waste
Definition
refers to discarded, obsolete, or broken electronic devices (ex: CD's DVD's, Thumb Drives, Printer Cartridges, Cells phones..)
Term
Moore's Law
Definition
which refers to the computer chip performance per dollar doubles every 18 months
Term
Hot Site
Definition
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
Term
Cold Site
Definition
a separate facility that does not have any computer equipment but is a place where employees can move after a disaster
Term
Warm site
Definition
a separate facility with computer equipment that requires installation & configuration
Term
Denial of Service Attack (DOS)
Definition
floods a website with so many request for service that is slows down or crashes the site
Term
Distributed Denial of Service attack (DDOS)
Definition
multiple computers flood a website with request for service to slow it down or crash it
Supporting users have an ad free experience!